Sciweavers

1995 search results - page 206 / 399
» Belief in Information Flow
Sort
View
ESOP
2007
Springer
14 years 2 months ago
Controlling the What and Where of Declassification in Language-Based Security
Abstract. While a rigorous information flow analysis is a key step in obtaining meaningful end-to-end confidentiality guarantees, one must also permit possibilities for declassific...
Heiko Mantel, Alexander Reinhard
ASIAN
2006
Springer
104views Algorithms» more  ASIAN 2006»
14 years 2 months ago
Closing Internal Timing Channels by Transformation
Abstract. A major difficulty for tracking information flow in multithreaded programs is due to the internal timing covert channel. Information is leaked via this channel when secre...
Alejandro Russo, John Hughes, David A. Naumann, An...
IFIP
2010
Springer
13 years 5 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 10 months ago
Entropy-optimal Generalized Token Bucket Regulator
Abstract-- We derive the maximum entropy of a flow (information utility) which conforms to traffic constraints imposed by a generalized token bucket regulator, by taking into accou...
Ashutosh Deepak Gore, Abhay Karandikar
IJMI
2006
73views more  IJMI 2006»
13 years 10 months ago
Six methodological steps to build medical data warehouses for research
In this paper we describe a methodology that emerged during a healthcare project, which consisted among others in grouping information from heterogeneous and distributed informati...
Nicolae B. Szirbik, C. Pelletier, Thierry J. Chaus...